AES Encryption with HMAC-SHA2 for Kerberos 5
draft-ietf-kitten-aes-cts-hmac-sha2-06
The information below is for an old version of the document | |||
---|---|---|---|
Document | Type | Expired Internet-Draft (kitten WG) | |
Authors | Michael Jenkins , Michael Peck , Kelley Burgin | ||
Last updated | 2015-08-14 (latest revision 2015-02-10) | ||
Stream | Internent Engineering Task Force (IETF) | ||
Formats |
Expired & archived
pdf
htmlized (tools)
htmlized
bibtex
|
||
Reviews | |||
Stream | WG state | In WG Last Call | |
Document shepherd | No shepherd assigned | ||
IESG | IESG state | Expired | |
Consensus Boilerplate | Unknown | ||
Telechat date | |||
Responsible AD | (None) | ||
Send notices to | (None) |
https://www.ietf.org/archive/id/draft-ietf-kitten-aes-cts-hmac-sha2-06.txt
Abstract
This document specifies two encryption types and two corresponding checksum types for Kerberos 5. The new types use AES in CTS mode (CBC mode with ciphertext stealing) for confidentiality and HMAC with a SHA-2 hash for integrity.
Authors
Michael Jenkins
(mjjenki@tycho.ncsc.mil)
Michael Peck
(mpeck@mitre.org)
Kelley Burgin
(kelley.burgin@gmail.com)
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)